
Sign up to save your podcasts
Or


Summary
In this episode of Below the Surface, Paul Asadoorian and Chase Snyder delve into various cybersecurity topics, including the use of Raspberry Pi in cyber attacks, the implications of the F5 breach, and the emergence of Polar Edge malware targeting QNAP devices. They also discuss the innovative Two-Face Rust binary technique, the critical nature of authentication bypass vulnerabilities, and the evolving landscape of air-gapped systems. The conversation highlights the increasing risk posed by old vulnerabilities and the need for improved security measures in the face of advancing cyber threats.
Articles:
https://reporter.deepspecter.com/f5-is-misleading-the-market-the-breach-is-nowhere-near-contained-a766d932c582
https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/
https://www.group-ib.com/blog/unc2891-bank-heist/
https://www.synacktiv.com/en/publications/creating-a-two-face-rust-binary-on-linux
https://www.dell.com/support/kbdoc/en-us/000382899/dsa-2025-393-security-update-for-storage-center-dell-storage-manager-vulnerabilities
https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html
By Eclypsium5
22 ratings
Summary
In this episode of Below the Surface, Paul Asadoorian and Chase Snyder delve into various cybersecurity topics, including the use of Raspberry Pi in cyber attacks, the implications of the F5 breach, and the emergence of Polar Edge malware targeting QNAP devices. They also discuss the innovative Two-Face Rust binary technique, the critical nature of authentication bypass vulnerabilities, and the evolving landscape of air-gapped systems. The conversation highlights the increasing risk posed by old vulnerabilities and the need for improved security measures in the face of advancing cyber threats.
Articles:
https://reporter.deepspecter.com/f5-is-misleading-the-market-the-breach-is-nowhere-near-contained-a766d932c582
https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/
https://www.group-ib.com/blog/unc2891-bank-heist/
https://www.synacktiv.com/en/publications/creating-a-two-face-rust-binary-on-linux
https://www.dell.com/support/kbdoc/en-us/000382899/dsa-2025-393-security-update-for-storage-center-dell-storage-manager-vulnerabilities
https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html

229,305 Listeners

153,606 Listeners

2,010 Listeners

209 Listeners

268 Listeners

374 Listeners

654 Listeners

16 Listeners

89 Listeners

318 Listeners

8,043 Listeners
![Talkin' Bout [Infosec] News by Black Hills Information Security](https://podcast-api-images.s3.amazonaws.com/corona/show/516141/logo_300x300.jpeg)
92 Listeners

61 Listeners

607 Listeners

1 Listeners